Hacking

These 2 attacks allow to alter certified PDF Documents

Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature.…

5 years ago

China-linked APT groups targets orgs via Pulse Secure VPN devices

Researchers from FireEye warn that China-linked APT groups continue to target Pulse Secure VPN devices to compromise networks. Cybersecurity researchers…

5 years ago

Microsoft details new sophisticated spear-phishing attacks from NOBELIUM

Microsoft experts uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind SolarWinds hack. Microsoft Threat Intelligence…

5 years ago

APT hacked a US municipal government via an unpatched Fortinet VPN

The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an…

5 years ago

NASA identified 1,785 cyber incidents in 2020

NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office…

5 years ago

Nearly 50,000 IPs compromised in Kubernetes clusters by TeamTNT

Researchers discovered about 50,000 IPs across multiple Kubernetes clusters that were compromised by the TeamTNT.threat actors. Researchers from Trend Micro reported…

5 years ago

Google discovered a new variant of Rowhammer attack dubbed Half-Double

Google experts discovered a new variant of Rowhammer attack against RAM memory cards that bypasses all current defenses Google researchers…

5 years ago

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

The Belgian interior ministry was targeted by a "sophisticated" cyber attack, a spokesman told RTBF public television on Tuesday.  The…

5 years ago

Agrius group targets Israel with data-wipers disguised as ransomware

An Iran-linked threat actor tracked as Agrius employed data-wipers disguised as ransomware to destroy targeted IT infrastructure. Researchers from cyber-security…

5 years ago

French intel found flaws in Bluetooth Core and Mesh specs

Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at…

5 years ago

This website uses cookies.